IT ERA Flashcards

(65 cards)

1
Q

Defined as a crime in which a computer is the object of
the crime (hacking, phishing, spamming) or is used as a
tool to commit an offense (child pornography, hate
crimes).

A

CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybercrime may also be referred to as _______________________

A

computer crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TWO CATEGORIES OF
CYBERCRIME ACTIVITIES

A
  • Crimes that target computer networks or devices.
  • Crimes that use computer networks to advance other criminal activities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These types of crimes include viruses and denial-of-service (DoS) attacks.

A

Crimes that target computer networks or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These types of crimes
include cyberstalking, phishing and fraud or
identity theft.

A

Crimes that use computer networks to advance
other criminal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RA 8792

A

E-commerce (Electronic Commerce) Law of the Philippines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to the business over the internet.
Websites such as Lazada, Zalora, Shopee and etc.

A

E-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RA 8792 Allows the formation of contracts in _____________________

A

electronic form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__________________________ supervises the
e-commerce development in the Philippines.

A

Department of Trade & Industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provided guidelines as to when a service provider can
be liable.

A

RA 8792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sells products/services
directly to personal use customers. It includes online
retailing, banking, travel services, auctions, health, and real
estate sites.

A

Business-to-Consumer (B2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

involves transactions
between business, such as manufacturer to wholesaler and
wholesaler to retailer.

A

Business-to-Business (B2B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provide a secure legal framework and environment for
electronic commerce.

Protect the integrity of electronic documents and signatures,
as well as its transmission and communication so as to build
and ensure the trust and reliance of the public on electronic
transactions.

A

RA 8792 OBJECTIVES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RA 10175 was signed into law by President _________________________ on
_________________________.

A

Benigno Aquino III, September 12, 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RA 10175 went into effect on ___________________

A

October 3, 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RA 10175 received a temporary restraining order (TRO) on ___________________________

A

October 9, 2012.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Anti-Wiretapping Law

A

RA 4200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access Device Regulation Act

A

RA 8484

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

E-commerce Law

A

RA 8792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Anti-Trafficking in Persons Act

A

RA 9208

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Anti-Child Pornography Act

A

RA 9775

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Anti-Photo and Voyeurism Act

A

RA 9995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RA 10175 identifies the ____________________ and the
________________________ as key enforcement agencies.

A

Philippine National Police (PNP), National Bureau of Investigation (NBI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RA 10175 Created an Office of Cybercrime within the ______

A

DOJ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CICC meaning
Cybercrime Investigation and Coordinating Center
26
Allows authorities to intercept, copy, and block data by virtue of a search and seizure warrant.
RA 10175 CICC
27
Unauthorized Access to a computer system or application
Illegal Access
28
Illegal Access Penalty
6-12 years or 200k fine, if done against critical infrastructure 12-25 years or 500k fine
29
Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system
Illegal Interception
30
Unauthorized alternation, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses
Data Interference
31
Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses
System Interference
32
Unauthorized use, possession, reproduction, sale, procurement, importation, distribution, or otherwise making available, of devices, computer designed or adapted for the purpose of committing any of the offenses stated in RA 10175
Misuse of Device
33
Acquisition of domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive other form the registering the same.
Cyber-Squatting
34
Unauthorized input, alteration, or deletion of computer data resulting to inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intellegable
Computer-related Forgery
35
Computer-related Forgery Penalty
6-12 years or 200k fine
36
Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent
Computer-related Fraud
37
Unauthorized acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another, whether natural or juridical
Computer-related Identity Theft
38
Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organ or sexual activity, with the aid of a computer system, for favor or consideration
Cybersex
39
unlawful or prohibited acts defined and punishable by RA 9775. committed through a computer system
Child Pornography
40
Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended committed through a computer system or any other similar means which may be devised in the future
Libel
41
RA 10175
Cybercrime Law of the Philippines
42
RA 10173
Data Privacy Act
43
An act protecting individual personal information in information and communications systems in the government and private sector, creating for this purpose a National Privacy Commission (NPC), and for other purposes.
RA 10173
44
In RA 10173 The _______________________ is the responsible agency and home to the NPC.
Department of Information and Communications Technology (DICT)
45
Companies with at least _____ employees or access to the personable and identifiable information of at least _______ people are required to register in 10173
250, 1,000
46
An act creating the Department of Information and Communications Technology (DICT), defining its powers and functions appropriating funds therefor, and for other purposes.
RA 10844
47
RA 10844
Department of Information and Communications Technology (DICT) Act
48
Improving Public Access Educate and expand our knowledge on Information and Communications Technology (ICT) Protect the Consumer and Industry development Nation Building through ICT Safeguarding of Information Widen the scope of ICT in the Philippines
THINGS RA 10844 FOCUSES ON
49
The university's IP policy only applies to research activities that result in patented or copyrighted materials True or False
False
50
Applies to all research and creative activities Covers tangible and intangible research properties/outcomes Includes activities with or without patent/copyright protection Encompasses all resources used for research Includes all technology transfer arrangements
Section 1. Applicability.
51
All rights in IP devised, created, or made by a University Employee or a Student-Employee in the normal course of their assigned duties and activities of employment shall generally be owned automatically by the ___________________
University.
52
What is the main benefit of patent protection for inventors? A. Free public use of their inventions B. Financial compensation for creative works C. Exclusive rights to exploit the invention for a limited time D. Immediate commercialization of their invention
B. Financial compensation for creative works
53
Dr. X, a professor of computer science at the university, has developed a novel algorithm for optimizing network traffic flow. She created this algorithm while discussing a problem with a graduate student during office hours. Which of the following statements is true based on this Policy? A. Dr. X retains full ownership of the algorithm. B. The University automatically owns the algorithm. C. Dr. X needs to file a patent application to claim ownership. D. The University must negotiate with Dr. X for the right to own the algorithm.
B) The University automatically owns the algorithm.
54
Students whom the University does not employ shall generally ___________________________ Rights they devised, created, or made in the normal course of their studies at the University, such as class projects or course requirements, including but not limited to theses, capstone projects, design projects, dissertations, and other scholarly works.
own all IP and associated IP
55
IP of Students' works with significant contribution from the University Employees, as part of their responsibilities as advisers and the technical panel, shall be ________ by the University and the Student.
co-owned
56
A graduate student who creates an innovative algorithm for their thesis project, with guidance from their advisor but without any direct contribution from university employees beyond typical academic supervision, retains full ownership of the intellectual property rights to the algorithm. True or False
False
57
Ownership of IP devised, created, or made by other persons performing research tasks in the University, who are neither employees nor students, in the course of their research activities in the University shall generally be owned automatically by the __________ unless there is a separate agreement regarding ownership entered into between said parties.
University
58
Upon leaving the University, a Visitor must complete and submit an ____________________ to the ITSO, revealing any IP created during their time at the University.
IP Disclosure form
59
Dr. Maria Rodriguez, a renowned researcher from Spain, spends six months at the University of Immaculate Conception (UIC), collaborating with faculty members on a cutting-edge biotechnology project. She developed a novel gene editing technique that showed great promise for treating genetic diseases during her stay. Upon completing her visit, Dr. Rodriguez prepares to return to her home institution. What should she do regarding the intellectual property rights of the gene editing technique? A. Keep all rights to herself as she is not a UIC employee or student B. Automatically transfer all rights to UIC C. Complete and submit an IP Disclosure form to the ITSO D. Negotiate a separate agreement with UIC regarding ownership
C) Complete and submit an IP Disclosure form to the ITSO
60
Professor Lee, a renowned computer scientist at UIC, has been working on a revolutionary AI system with his team. They've developed a sophisticated natural language processing algorithm that could significantly impact various industries. As they near completion of the project, Professor Lee realizes that he wants to ensure his team members receive fair credit and compensation for their contributions. He approaches the university administration to discuss the ownership of the AI system and its components. Which of the following statements accurately reflects what can happen according to the UIC IP Policy? A. The university will automatically own all rights to the AI system and its components. B. Professor Lee and his team must accept whatever ownership arrangement the university decides. C. The ownership of the AI system and its components can be determined through an agreement between Professor Lee, his team, and the university. D. Only Professor Lee can negotiate ownership rights, regardless of who contributed to the project.
C. The ownership of the AI system and its components can be determined through an agreement between Professor Lee, his team, and the university.
61
Creators will provide the University a _________________________ right to use their IP Works for the University's administrative, promotional, research, and educational activities, among others. Creators shall diligently make efforts to commercialize the University IP.
non-exclusive, royalty-free
62
Dr. James, a physics professor at UIC, invents a new method for improving solar panel efficiency. He plans to start a company to commercialize this technology. However, he also wants to ensure that his colleagues in the physics department can continue to use and study this method in their research. True or False
False
63
Dr. Rachel, a literature professor at UIC, writes a groundbreaking book on postmodern poetry. When the university's marketing department prepares to promote the book, they want to modify the title and cover design without consulting Dr. Rachel. True or False
The university can alter the title and cover design of Dr. Patel's book without her consent, as long as they acknowledge her authorship. Answer False
64
University employees, students, and visitors are ________________ from entering into any research contract with external parties on behalf of the University unless an official express authorization from a representative of the University is obtained.
prohibited
65
Net IP Revenue received by the University shall be distributed as follows:
70% Creator 10% University 20% Other relevant organizational units (RPIC)